What are the types of Eavesdropping attacks?
- Passive & Active
- Data driven & software written
- Right & Wrong
- malicous & outbound
EXPLANATION
Eavesdropping attacks occur through the interception of network traffic. By eavesdropping, an attacker can obtain passwords, credit card numbers and other confidential information that a user might be sending over the network. Eavesdropping can be passive or active:- Passive eavesdropping — A hacker detects the information by listening to the message transmission in the network.
- Active eavesdropping — A hacker actively grabs the information by disguising himself as friendly unit and by sending queries to transmitters. This is called probing, scanning or tampering.
Data encryption is the best countermeasure for eavesdropping.
0 comments:
Post a Comment